We are working with our CPE vendor, Pace, to patch a vulnerability in the 4111N CPE that leaves the device vulnerable to NTP amplification attacks.
A patch will be pushed to all Pace 4111Ns on our network as each device checks in with the ACS over the next 24 hours. Rebooting the device will allow the patch to be applied immediately. Connectivity should not be interrupted as a result of this update.
– Adam E. and the Support Team.